Deck 5: Java Programming Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 5: Java Programming Security
1
16)The ____ collector is a generational collector that has been implemented to emphasize the throughput of the application or low garbage collection pause times.
A) incremental low pause
B) concurrent low pause
C) throughput
D) serial
A) incremental low pause
B) concurrent low pause
C) throughput
D) serial
C
2
17)____ objects imply that contents can be changed.
A) Static
B) Mutable
C) Instance
D) Public
A) Static
B) Mutable
C) Instance
D) Public
B
3
2)In Java, a sandbox provides strong protection against nuisances and denial of service (DOS) attacks.
False
4
13)Calling the ____ method instructs the JVM to recycle unused objects in order to make the memory available for quick reuse.
A) free
B) delete
C) release
D) gc
A) free
B) delete
C) release
D) gc
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
12)With automatic ____, the Java programmer is freed of the complex task of deciding when and where to safely release memory.
A) stack access
B) memory access
C) garbage collection
D) heap management
A) stack access
B) memory access
C) garbage collection
D) heap management
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
14)____ generation is defined as objects allocated in a generation for shorter-lived objects in memory.
A) Young
B) Single
C) Simple
D) Early
A) Young
B) Single
C) Simple
D) Early
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
5)No class in the same package can access an inner class after it is compiled.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
1)The Java programming language is a multiplatform programming language.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
3)The syntax of Java language started as a subset of the popular object-oriented language C++.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
6)The JVM relies on the platform and various software technologies to present a secure location where Java programs run. This secure location is called a(n) ____ in JVM terminology.
A) procedure domain
B) execution domain
C) callbox
D) sandbox
A) procedure domain
B) execution domain
C) callbox
D) sandbox
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
20)Under the ____ model, each Java class executes within one and only one protection domain.
A) graybox
B) sandbox
C) protection-mapping
D) domain
A) graybox
B) sandbox
C) protection-mapping
D) domain
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
11)____ are used instead of pointers to allow Java programmers to create data structures.
A) References
B) Structs
C) Records
D) Nodes
A) References
B) Structs
C) Records
D) Nodes
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
4)To build a secure and efficient Java program, a developer should always try the collector chosen by the JVM on the application first.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
8)When a class is presented to run in a JVM, the ____ finds the class, loads the byte codes, performs verification, executes its main method, and then loads any supplemental classes.
A) ClassProfile
B) ClassHandler
C) ClassLoader
D) ClassBooting
A) ClassProfile
B) ClassHandler
C) ClassLoader
D) ClassBooting
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
15)A ____ object is defined as an object that is no longer be reached from any pointer in running programs under a JVM.
A) young
B) linear
C) serial
D) garbage
A) young
B) linear
C) serial
D) garbage
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
18)The ____ security model is used as the original Java security model.
A) black box
B) graybox
C) security by signing
D) sandbox
A) black box
B) graybox
C) security by signing
D) sandbox
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
9)The ____ extends ClassLoader with additional support for defining classes with an associated code source and permissions that are retrieved by the system policy by default.
A) SecureClassLoader
B) URLClassLoader
C) PolicyClassLoader
D) DomainClassLoader
A) SecureClassLoader
B) URLClassLoader
C) PolicyClassLoader
D) DomainClassLoader
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
10)____ is used to load classes and resources from a search path of URLs referring to both Java archive (JAR) files and directories.
A) DomainClassLoader
B) URLClassLoader
C) RemoteClassLoader
D) SecureClassLoader
A) DomainClassLoader
B) URLClassLoader
C) RemoteClassLoader
D) SecureClassLoader
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
7)A programmer can exam the byte codes by disassembling a class file using the command ____ .
A) java -c class_name
B) javap -c class_name
C) javac -c class_name
D) java -p class_name
A) java -c class_name
B) javap -c class_name
C) javac -c class_name
D) java -p class_name
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
19)The ____ provides fine-grained control on what operation can be run within the JVM.
A) ClassLoader
B) SecurityManager
C) SecurityException
D) SecuritySandbox
A) ClassLoader
B) SecurityManager
C) SecurityException
D) SecuritySandbox
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
40)Briefly describe the ProtectionDomain class.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
26)The ____ class is used for access control operations and decision making.
A) AccessController
B) SecurityManager
C) ClassLoader
D) java.security.Object
A) AccessController
B) SecurityManager
C) ClassLoader
D) java.security.Object
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
34)What is the design goal of the Java language?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
38)How does a concurrent low pause collector work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
30)____________________ is a memory-management activity carried out by the Java runtime environment to reclaim dynamically allocated memory that is no longer being used.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
37)How does a serial collector work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
31)A(n) ____________________ serves as a group that contains objects that have the same accessibility and protection.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
35)How does Java prevent invalid memory access?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
29)____________________ builds an environment that provides separate name spaces for classes loaded from different locations.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
25)Regarding protection domains, when an object from one domain calls code from another domain, the rule of ____ is employed.
A) uniqueness
B) complement
C) union
D) intersection
A) uniqueness
B) complement
C) union
D) intersection
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
36)What are the advantages and disadvantages of automatic garbage collection?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
41)Regarding protection domains, how can objects in one domain automatically discover objects in another domain?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
33)Describe the four-step Java byte code verification process.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
22)A ____ object represents the policy for a Java application environment.
A) security
B) policy
C) permission
D) grant
A) security
B) policy
C) permission
D) grant
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
21)The core of Java permissions is the ____ class.
A) java.security.Permission
B) ClassLoader
C) java.security.Policy
D) SecurityManager
A) java.security.Permission
B) ClassLoader
C) java.security.Policy
D) SecurityManager
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
24)A ____ is a database of private keys and their associated digital certificates.
A) permission store
B) grant entry
C) keystore
D) policy rule
A) permission store
B) grant entry
C) keystore
D) policy rule
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
27)All Java programs run on a common platform called the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
23)Individual permissions can be set using the ____ program without any programming.
A) policytool
B) securityManager
C) gc
D) policy
A) policytool
B) securityManager
C) gc
D) policy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
28)Java ____________________ is the machine language of the JVM.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
39)What are the attributes of a protection domain?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
42)What are the purposes of the AccessController class?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck